As CISO of West, a Williston Financial Group company, Bruce Phillips recognizes that cybersecurity is not the enterprise's core business. But what, then, is the right level of cybersecurity to bring to a nonsecurity business? He discusses this and other leadership challenges.
Cisco says it fell victim to a successful hack attack and data breach in May. While an attacker wielding Yanluowang ransomware claimed to have exfiltrated data and crypto-locked systems, Cisco says nothing sensitive was stolen and no systems were infected by ransomware.
Black Hat USA 2022 opened with somber warnings from Chris Krebs about why application developers, vendors and the government need to solve major industry challenges. Key security executives also discussed DNS visibility, cloud security, patch management, APT strategies and supply chain woes.
Organizations are utilizing cloud-native software development for faster product releases and innovation cycles. With the volume of releases and workloads running in the cloud, security teams need an efficient way to manage security that scales with the speed and volume of cloud-native development.
As organizations utilize cloud-native software development for faster product releases and innovation cycles, they need a modernized approach that operationalizes security into development processes. To effectively
manage security and risk, they need full visibility across cloud environments—without any blind...
Cloudflare credits hardware multifactor authentication with preventing bad actors behind a targeted phishing campaign from gaining access to its internal systems. Although attackers siphoned employee credentials, the hard key authentication requirement stopped attackers from snatching a soft token.
Lacework has used the $1.3 billion raised to strengthen its multi-cloud support, giving customers better visibility across development and production environments. The company is able to identify elusive threats and zero-day vulnerabilities by finding spikes in anomalous activity.
An open architecture, a single pane of glass and robust endpoint security are vital to fueling Trellix's growth in XDR, says Chief Product Officer Aparna Rayasam. Trellix has given customers a unified view into their security posture for configuration, reporting and forensic purposes.
Fortinet has taken advantage of its ASIC chip and network security expertise to drive massive growth in both its SD-WAN and OT security businesses, CEO Ken Xie says. OT devices are difficult to secure on their own, so Fortinet uses its ability to block bad network traffic to keep them secure.
Two hacking incidents - one reported by a Texas-based substance abuse treatment network that operates in several states and the other by a New Mexico community health center - have affected the sensitive medical information of nearly 300,000 individuals.
While Managed EDR can help in many endpoint scenarios, it’s important to be aware that going beyond the endpoint allows MDR and extended detection and response (XDR) to offer broader cybersecurity coverage.
ISMG caught up with 11 security executives in Las Vegas on Tuesday to discuss everything from open-source intelligence and Web3 security to training new security analysts and responding to directory attacks. Here's a look at some of the most interesting things we heard from industry leaders.
APIs are now the largest attack vector for abuse, data loss and fraud across nearly every industry. In addition, organizations are using outdated, unreliable methods to API security, and aren’t yet including the protection of the API layer in those plans. These approaches are proving insufficient, especially given...
The rise of ransomware brokers and the continued talent shortage mean defenders increasingly need security technology managed on their behalf, Sophos' Kris Hagerman says. Customers must manage all their security products from a single platform and analyze the data these tools generate, he says.
In the wake of rapid cloud migration, visibility has been a common challenge for many organizations. But add detection, investigation and response to that list. Colin O'Connor, COO of ReliaQuest, shares insights and a case study for overcoming these cloud security challenges.